This document discusses honeypots as a solution for internet-based data security. It defines honeypots as fake computer systems designed to collect data on intruders by appearing as legitimate systems. The document outlines different types of honeypots including production honeypots for organizations, research honeypots to study hacker tactics, and database honeypots to capture SQL injections. It also discusses low and high interaction honeypots, with low interaction simulating services and high interaction using whole systems. Finally, it introduces honey nets as networks of monitored high interaction honeypots simulating a production environment.